default search action
CoRR, August 2011
- Sheng Yi, Hamid Krim, Larry K. Norris:
A Invertible Dimension Reduction of Curves on a Manifold. - Narayan Prasad, Honghai Zhang, Hao Zhu, Sampath Rangarajan:
Multi-User MIMO Scheduling in the Fourth Generation Cellular Uplink. - Jeff M. Phillips, Parasaran Raman, Suresh Venkatasubramanian:
Generating a Diverse Set of High-Quality Clusterings. - Ahmad Abu Al Haija, Mai Vu:
Achievable Rates and Outer Bound for the Half-Duplex MAC with Generalized Feedback. - Alessandra Sala, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng, Ben Y. Zhao:
Revisiting Degree Distribution Models for Social Graph Analysis. - Atilim Günes Baydin, Ramón López de Mántaras, Simeon J. Simoff, Carles Sierra:
CBR with Commonsense Reasoning and Structure Mapping: An Application to Mediation. - Adam B. Yedidia, Michael Chertkov:
Computing the Permanent with Belief Propagation. - Philippe Jacquet, Salman Malik, Bernard Mans, Alonso Silva:
On the Throughput-Delay Trade-off in Georouting Networks. - Jiangyuan Li, Athina P. Petropulu:
Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels with Spherical Uncertainty. - K. Savitha, C. Chandrasekar:
Trusted Network Selection using SAW and TOPSIS Algorithms for Heterogeneous Wireless Networks. - Alexandra Silva, Simon Bliudze, Roberto Bruni, Marco Carbone:
Proceedings Fourth Interaction and Concurrency Experience, ICE 2011, Reykjavik, Iceland, 9th June 2011. EPTCS 59, 2011 [contents] - Michael Schneider, Geoff Sutcliffe:
Reasoning in the OWL 2 Full Ontology Language using First-Order Automated Theorem Proving. - Mardavij Roozbehani, Alexandre Megretski, Eric Feron:
Optimization of Lyapunov Invariants in Verification of Software Systems. - Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu:
Differentially Private Search Log Sanitization with Optimal Output Utility. - Yuedong Xu, Eitan Altman, Rachid El Azouzi, Majed Haddad, Salah-Eddine Elayoubi, Tania Jiménez:
Probabilistic Analysis of Buffer Starvation in Markovian Queues. - Sergio Antoy:
On the Correctness of Pull-Tabbing. - Philip Brighten Godfrey:
BGP Stability is Precarious. - Nikolaos Pappas, Jeongho Jeon, Anthony Ephremides, Apostolos Traganitis:
Optimal Utilization of a Cognitive Shared Channel with a Rechargeable Primary Source Node. - Yang D. Li:
BQP and PPAD. - Luca Aceto, Matteo Cimini, Anna Ingólfsdóttir, Arni Hermann Reynisson, Steinar Hugi Sigurdarson, Marjan Sirjani:
Modelling and Simulation of Asynchronous Real-Time Systems using Timed Rebeca. 1-19 - Ross Horne, Vladimiro Sassone:
A Verified Algebra for Linked Data. 20-33 - Simon Ware, Robi Malik:
A State-Based Characterisation of the Conflict Preorder. 34-48 - Chiara Bodei, Viet Dung Dinh, Gian-Luigi Ferrari:
Predicting global usages of resources endowed with local policies. 49-64 - José Proença, Dave Clarke, Erik P. de Vink, Farhad Arbab:
Decoupled execution of synchronous coordination models via behavioural automata. 65-79 - Mausumi Bose, Aloke Dey, Rahul Mukerjee:
Key Predistribution Schemes for Distributed Sensor Networks. - Carlos Cotta, Antonio Miguel Mora, Cecilia Merelo-Molina, Juan Julián Merelo Guervós:
FIFA World Cup 2010: A Network Analysis of the Champion Team Play. - Amy Poh Ai Ling, Masao Mukaidono:
Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System. - Feng Niu, Ce Zhang, Christopher Ré, Jude W. Shavlik:
Felix: Scaling Inference for Markov Logic with an Operator-based Approach. - Benjamin Doerr, Leslie Ann Goldberg:
Adaptive Drift Analysis. - Rüdiger Ehlers:
Small witnesses, accepting lassos and winning strategies in omega-automata and games. - Rémy Haemmerlé:
Observational equivalences for linear logic CC languages. - Rémy Haemmerlé:
(Co-)Inductive semantics for Constraint Handling Rules. - Stefano Panzieri, Gabriele Oliva, Roberto Setola:
Fuzzy Consensus and Synchronization: Theory and Application to Critical Infrastructure Protection Problems. - Benjamin Doerr, Timo Kötzing, Johannes Lengler, Carola Winzen:
Black-Box Complexities of Combinatorial Problems. - Velimir M. Ilic:
Entropy Semiring Forward-backward Algorithm for HMM Entropy Computation. - Velimir M. Ilic, Miroslav D. Ciric, Miomir S. Stankovic:
Cross-moments computation for stochastic context-free grammars. - William O'Mullane, Xavier Luri, Paul Parsons, Uwe Lammers, John Hoar, Jose Hernandez:
Using Java for distributed computing in the Gaia satellite data processing. - Fabian Steeg:
Typesafe Modeling in Text Mining. - Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traffic. - Anh Le, Athina Markopoulou:
On Detecting Pollution Attacks in Inter-Session Network Coding. - Fei Li:
A Comprehensive Study of an Online Packet Scheduling Algorithm. - Erik Agrell:
The Channel Capacity Increases with Power. - Frans A. Oliehoek, Shimon Whiteson, Matthijs T. J. Spaan:
Exploiting Agent and Type Independence in Collaborative Graphical Bayesian Games. - Sergey Kardash:
Algorithmic complexity of pair cleaning method for k-satisfiability problem. (draft version). - Shvetha Soundararajan:
A Methodology for assessing Agile Software Development Approaches. - Feng Wang, Haiyang Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. - Meng Wang, Weiyu Xu, Enrique Mallada, Ao Tang:
Sparse Recovery with Graph Constraints: Fundamental Limits and Measurement Construction. - Tom Hirschowitz, Damien Pous:
Innocent strategies as presheaves and interactive equivalences for CCS. 2-24 - Vincenzo Ciancia:
Interaction and observation, categorically. 25-36 - Andrei Dorman, Tobias Heindel:
Structured Operational Semantics for Graph Rewriting. 37-51 - Viviana Bono, Luca Padovani:
Polymorphic Endpoint Types for Copyless Message Passing. 52-67 - Ilias Garnier, Christophe Aussaguès, Vincent David, Guy Vidal-Naquet:
On the reaction time of some synchronous systems. 69-83 - Sung-Shik T. Q. Jongmans, Farhad Arbab:
Correlating Formal Semantic Models of Reo Connectors: Connector Coloring and Constraint Automata. 84-103 - Timothy A. S. Davidson, Simon J. Gay, Rajagopal Nagarajan:
Formal Analysis of Quantum Systems using Process Calculus. 104-110 - Laura Bocchi, Julien Lange, Emilio Tuosto:
Amending Contracts for Choreographies. 111-129 - Massimo Bartoletti, Emilio Tuosto, Roberto Zunino:
Contracts in distributed systems. 130-147 - Saverio Perugini:
Staging Mixed-Initiative Dialogs by Program Generation and Transformation. - Arian Maleki, Laura Anitori, Zai Yang, Richard G. Baraniuk:
Asymptotic Analysis of Complex LASSO via Complex Approximate Message Passing (CAMP). - Nimalan Nandapalan, Richard P. Brent, Lawrence M. Murray, Alistair P. Rendell:
High-Performance Pseudo-Random Number Generation on Graphics Processing Units. - Ian R. Petersen:
A Kalman Decomposition for Possibly Controllable Uncertain Linear Systems. - Rom Aschner, Matthew J. Katz, Gila Morgenstern:
Symmetric Connectivity with Directional Antennas. - Bogdan Aman:
Spatial Dynamic Structures and Mobility in Computation. - Jagdish Lal Raheja, Karen Das, Ankit Chaudhary:
An Efficient Real Time Method of Fingertip Detection. - Vahid Aref, Rüdiger L. Urbanke:
Universal Rateless Codes From Coupled LT Codes. - Wing-Kai Hon, Rahul Shah, Sharma V. Thankachan:
Towards an Optimal Space-and-Query-Time Index for Top-$k$ Document Retrieval. - Fritz Müller:
On Berry's conjectures about the stable order in PCF. - Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
A Group Signature Based Electronic Toll Pricing System. - Tomas Ramirez Picarzo, Francisco Fernández de Vega, Daniel Lombraña Gonzalez:
Proposal for improvement in the transfer and execution of multiple instances of a virtual image. - Laurent Romary, Amir Zeldes, Florian Zipser:
[tiger2/]- Serialising the ISO SynAF Syntactic Object Model. - Yuichiro Fujiwara, Vladimir D. Tonchev:
A characterization of entanglement-assisted quantum low-density parity-check codes. - Carlos A. Astudillo, Adriana M. Gustin, Oscar J. Calderón:
Policy Creation Model for Policy-Based Management in Telecommunications Networks. - Eduardo Cunha de Almeida:
Estudo de Viabilidade de uma Plataforma de Baixo Custo para Data Warehouse. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:
A Novel Trajectory Clustering technique for selecting cluster heads in Wireless Sensor Networks. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:
Enhanced User Authentication through Trajectory Clustering. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:
A Hybrid Trajectory Clustering for Predicting User Navigation. - Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu:
A Fault Tolerant Trajectory Clustering (FTTC) for selecting cluster heads inWireless Sensor Networks. - R. Rathipriya, K. Thangavel, J. Bagyamani:
Binary Particle Swarm Optimization based Biclustering of Web usage Data. - Francis R. Bach, Rodolphe Jenatton, Julien Mairal, Guillaume Obozinski:
Optimization with Sparsity-Inducing Penalties. - Kristina Pickl, Jan Götz, Klaus Iglberger, Jayant Pande, Klaus Mecke, Ana-Suncana Smith, Ulrich Rüde:
All good things come in threes - Three beads learn to swim with lattice Boltzmann and a rigid body solver. - John Augustine, Gopal Pandurangan, Peter Robinson, Eli Upfal:
Towards Robust and Efficient Computation in Dynamic Peer-to-Peer Networks. - Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk, Jakub Onufry Wojtaszczyk:
Scheduling partially ordered jobs faster than 2^n. - Pablo Bisceglia, Leticia I. Gómez, Alejandro A. Vaisman:
Towards Spatio-Temporal SOLAP. - Amirali Abdullah, John Moeller, Suresh Venkatasubramanian:
Approximate Bregman near neighbors in sublinear time: Beyond the triangle inequality. - Irina E. Bocharova, Florian Hug, Rolf Johannesson, Boris D. Kudryashov, Roman V. Satyukov:
Searching for Voltage Graph-Based LDPC Tailbiting Codes with Large Girth. - Marcin Peczarski:
Towards Optimal Sorting of 16 Elements. - Xiaohu Shang, H. Vincent Poor:
Noisy-Interference Sum-Rate Capacity for Vector Gaussian Interference Channels. - Matthew P. Johnson, Alexander Gutfraind:
Evader Interdiction and Collateral Damage. - Richard A. Formato:
UWB Array Design Using Variable Zo Technology and Central Force Optimization. - Salman Malik, Alonso Silva, Jean-Marc Kelif:
Optimal Base Station Placement: A Stochastic Method Using Interference Gradient In Downlink Case. - G. S. Payette, K. B. Nakshatrala, J. N. Reddy:
On the performance of high-order finite elements with respect to maximum principles and the non-negative constraint for diffusion-type equations. - Phisan Kaewprapha, Jing Li, Nattakan Puttarak:
Network Localization on Unit Disk Graphs. - Kun-Yu Wang, Anthony Man-Cho So, Tsung-Hui Chang, Wing-Kin Ma, Chong-Yung Chi:
Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization. - Emmanuel Jeandel, Pascal Vanier:
Turing degrees of multidimensional SFTs. - Dror Baron:
Information Complexity and Estimation. - Antanas Zilinskas:
On strong homogeneity of two global optimization algorithms based on statistical models of multimodal objective functions. - T. Asha, S. Natarajan, K. N. Balasubramanya Murthy:
A Data Mining Approach to the Diagnosis of Tuberculosis by Cascading Clustering and Classification. - Magnús M. Halldórsson, Pradipta Mitra:
Wireless Capacity With Arbitrary Gain Matrix. - José Luis López-Presa, Antonio Fernández Anta, Luis Núñez Chiroque:
Conauto-2.0: Fast Isomorphism Testing and Automorphism Group Computation. - Robert Hristovski, Natalia Balagué, Josep Juaneda, Pablo Vázquez:
Onset of coherent attitude layers in a population of sports fans. - Bruno Nery, Rodrigo Ventura:
On the scalability and convergence of simultaneous parameter identification and synchronization of dynamical systems. - Klaus Wehmuth, Artur Ziviani:
Distributed Assessment of Network Centrality. - Yi Wei, Hannes Roth, Carlo A. Furia, Yu Pei, Alexander Horton, Michael Steindorfer, Martin Nordio, Bertrand Meyer:
Stateful Testing: Finding More Errors in Code and Contracts. - Christoph Koutschan, Viktor Levandovskyy, Oleksandr Motsak:
On Two-generated Non-commutative Algebras Subject to the Affine Relation. - Andrea Tilli, Lorenzo Marconi, Christian Conficoni:
Analysis, Dimensioning and Robust Control of Shunt Active Filter for Harmonic Currents Compensation in Electrical Mains. - Yaniv Taigman, Lior Wolf:
Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition. - Marcin Mucha:
Improved Analysis for Graphic TSP Approximation via Matchings. - Xiaohu Shang, H. Vincent Poor:
Capacity Region of Vector Gaussian Interference Channels with Generally Strong Interference. - Adeniran Isola Oluwaranti, Achimugu Philip:
Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation. - Oluwagbemi Oluwatolani, Abah Joshua, Achimugu Philip:
The Impact of Information Technology in Nigeria's Banking Industry. - Achimugu Philip, Oluwagbemi Oluwatolani, Abah Joshua:
Development of a Window Based Security System for Electronic Data Interchange. - Rudolf Ahlswede, Harout K. Aydinian:
On generic erasure correcting sets and related problems. - Karol Gregor, Yann LeCun:
Learning Representations by Maximizing Compression. - MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kortsarz, Zeev Nutov:
Combinatorial Algorithms for Capacitated Network Design. - Dominic Tsang, Sanjay Chawla:
An index for regular expression queries: Design and implementation. - Amar Prakash Azad, John Musacchio:
Unilateral Altruism in Network Routing Games with Atomic Players. - Yi Zhong, Wenyi Zhang:
Multi-channel Hybrid Access Femtocells: A Stochastic Geometric Analysis. - Juan Julián Merelo Guervós, Carlos Cotta, Antonio Miguel Mora:
1st International Workshop on Complex Systems in Sports - Proceedings. - Yao Sun, Dingkang Wang:
Solving Detachability Problem for the Polynomial Ring by Signature-based Groebner Basis Algorithms. - Ashok Kumar Das:
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge. - Oldooz Karimi:
Security Model For Service-Oriented Architecture. - Rasmus Pagh:
Compressed Matrix Multiplication. - Vijay Bhaskar Semwal, K. Susheel Kumar, Vinay S. Bhaskar, Meenakshi Sati:
Accurate location estimation of moving object with energy constraint & adaptive update algorithms to save data. - Masaaki Miki:
Three-term Method and Dual Estimate on Static Problems of Continuum Bodies. - Zohra Slimane, Abdelhafid Abdelmalek, Mohammed Feham, Abdelmalik Taleb-Ahmed:
Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model. - Bingxuan Zhao, Shigeru Shimamoto:
Two-stage coordination multi-radio multi-channel mac protocol for wireless mesh networks. - Ruichuan Chen, Eng Keong Lua, Zhuhua Cai, Jon Crowcroft, Zhong Chen:
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service. - Nenad Stojanovski, Marjan Gusev:
Architecture Of A Identity Based Firewall System. - Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Liyong Tang, Zhong Chen:
Phagocytes: A Holistic Defense and Protection Against Active P2P Worms. - Raied Salman, Vojislav Kecman, Qi Li, Robert Strack, Erik Test:
Fast k-means algorithm clustering. - N. Sasirekha, A. Edwin Robert, M. Hemalatha:
Program slicing techniques and its applications. - K. Susheel Kumar, Vijay Bhaskar Semwal, Ramesh Chandra Tripathi:
Real time face recognition using adaboost improved fast PCA algorithm. - Eladio Martin, Ruzena Bajcsy:
Variability of location management costs with different mobilities and timer periods to update locations. - Eladio Martin, Ruzena Bajcsy:
Savings in location management costs leveraging user statistics. - Vijay Arya, Darryl Veitch:
Sparsity without the Complexity: Loss Localisation using Tree Measurements. - Anis Ismail, Mohamed Quafafou, Nicolas Durand, Mohammad Hajjar:
An Efficient Architecture for Information Retrieval in P2P Context Using Hypergraph.